Chapter 6. Perimeter Threat

The previous chapters discussed the basics for exploring the first of three major use-case areas covered in this book. This chapter on perimeter threat covers a select set of use-cases that center on analyzing data that is useful for protecting the network perimeter. This chapter’s goal is to establish some tools for making perimeter protection more efficient and more fun. The chapter discusses how to protect the crown jewels from external threats.

The perimeter threat discussion hooks into the attack analysis process from Chapter 5, “Visual Security Analysis” (refer to Figure 5-22). Wherever the process mentions hypotheses, there is an opportunity for exploration, and this is what this chapter is about.

This chapter ...

Get Applied Security Visualization now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.